* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download 7. Some Modern Applications of Quantum Mechanics
Aharonov–Bohm effect wikipedia , lookup
Topological quantum field theory wikipedia , lookup
Renormalization group wikipedia , lookup
Relativistic quantum mechanics wikipedia , lookup
Basil Hiley wikipedia , lookup
Quantum decoherence wikipedia , lookup
Scalar field theory wikipedia , lookup
Renormalization wikipedia , lookup
Wave–particle duality wikipedia , lookup
Probability amplitude wikipedia , lookup
Path integral formulation wikipedia , lookup
Particle in a box wikipedia , lookup
Bell test experiments wikipedia , lookup
Double-slit experiment wikipedia , lookup
Density matrix wikipedia , lookup
Measurement in quantum mechanics wikipedia , lookup
Copenhagen interpretation wikipedia , lookup
Hydrogen atom wikipedia , lookup
Quantum field theory wikipedia , lookup
Wheeler's delayed choice experiment wikipedia , lookup
Coherent states wikipedia , lookup
Theoretical and experimental justification for the Schrödinger equation wikipedia , lookup
Quantum dot wikipedia , lookup
Bohr–Einstein debates wikipedia , lookup
Quantum fiction wikipedia , lookup
Quantum electrodynamics wikipedia , lookup
Symmetry in quantum mechanics wikipedia , lookup
Orchestrated objective reduction wikipedia , lookup
Many-worlds interpretation wikipedia , lookup
Quantum entanglement wikipedia , lookup
Bell's theorem wikipedia , lookup
Quantum computing wikipedia , lookup
Interpretations of quantum mechanics wikipedia , lookup
History of quantum field theory wikipedia , lookup
Quantum group wikipedia , lookup
Quantum machine learning wikipedia , lookup
EPR paradox wikipedia , lookup
Canonical quantization wikipedia , lookup
Delayed choice quantum eraser wikipedia , lookup
Quantum state wikipedia , lookup
Quantum cognition wikipedia , lookup
Hidden variable theory wikipedia , lookup
7. Some Modern Applications of Quantum Mechanics ‘What is particularly curious about quantum theory is that there can be actual physical effects arising from what philosophers refer to as counterfactuals-that is, things that might have happened, although they did not in fact happen’ [Penrose, 2005, p. 240]. 7.1 Introduction The rather strange nature of quantum mechanics is not only a question of ontological importance but can also be applied to various technological situations as well. To that end EPR’s contributions cannot be overestimated. Quantum cryptography, quantum computing, quantum dense coding, quantum currency, Elitzur-Vaidman bomb detection and the like are some of potential application areas that are being fast developed into separate major fields. Quantum cryptography is truly a single particle application. Other applications make use of EPR type entanglements and Bell type state measurements. The phenomena like quantum Zeno effect, quantum teleportation, and quantum erasing, have at present only experimental consequences but may in future have potential applications. Some of these are discussed in this chapter. 7.2 Quantum Computing Certain computational capabilities that cannot be even imagined by conventional methods may be made possible in the not so far away future. For instance, Shor quantum algorithm [Shor,1997] would make an unparalleled and unheard of quantum leap as far as factoring is concerned. As an illustration, say one wants to 104 factor a very large integer (say, having 250 digits) what the existing fastest super computers is estimated to take a time of the order of the age of the Universe (≈ 13.6 billion years!). But it would only be a matter of few seconds or at the maximum a few minutes for a quantum computer equipped with quantum polynomial algorithm for factoring, like that of Shor [Julian Brown,2001]. Similarly the Grover’s new efficient quantum search algorithms also would speed up searching phenomenally [Grover,1996]. If there are N number of the possible keys, then Grover’s quantum search algorithm can speed up the time from O(N) to O(N1/2). That means searching could be speeded up millions fold for very large value of N. What is impossible at present day might quite possible in future due to the developments in the field of quantum computing and computational algorithms. The technical difficulty in producing a quantum computer is the problem of decoherence, which is a big huddle to be surmounted. Yet the prototype quantum computers were developed with limited functions. These have lot of experimental value. According to David Deutsch the working of Quantum computer would prove the existence of many worlds of QM (chapter-6) and hence provide proof for this interpretation. David Deutsch, a great advocate of MWI says that the speed with which a quantum computer would work could be considered as a good demostration of the existence of the myriads of worlds. Deutsch arguments goes as follows. There are approximately 1080 atoms in the universe. The parallesim of quatum computing would require 10500 ways of computing in some cases. Therefore he argues that the existence of extra resources means more parallel ways of computing than can be afforded by the only resources of our universe proving the existence of parallel universes [Julian Brown, 2001]. Of course, we feel that recourse to consciousness might very well explain the above cited problem. 7.3 Quantum Cryptography Though cryptology is not really new, only in 1970’s the research in cryptology, crypto-analysis and related areas has gained observable impetus. Cryptography has precious applications in information communication. Cryptology includes a) 105 Cryptography, the art of encrypting /sending a message and b) crypto analysis, the art of decrypting. In order to do this, an algorithm (also called a cryptosystem or cipher) is utilized for jumbling up a message with what is known as the “key” to produce a cryptogram indecipherable and, therefore, unintelligible to any unauthorized party. In order to have a secure cryptosystem, it should be impossible to unlock the cryptogram without the key. The whole exercise is to safeguard the crucial secrecy of the original information of the message from any intrusion, technically called eavesdropping. Confidentiality was the traditional application of cryptogram. But, it has wider objectives now such as digital signatures, authentication, non-repudiation and so on [R-08]. Apart from several standard aspects of the field of number theory, there are its modern computational features and applications to cryptography. Any breakthrough in mathematics or in the field of computer science would, indeed, render the conventional cryptography not only useless and even having disastrous consequences. The potential power of quantum computing, as mentioned in the earlier section, would render the classical cryptography almost superfluous. For example, Shor algorithm of factorizing in quantum computing would render the classical RSA (Ronald Rivest, Adi Shamir and Leonard Adleman) type cryptography that relies on the computational complexity of factorization almost ineffective [Nicolas Gisin et al, 2009]. The speed with which a number can be factorized becomes phenomenal in quantum computing. Therefore any algorithm that relies on factorization like RSA type would become too inadequate. One of the main problems of cryptography is that of the key distribution (here after KD). Both public and private KD are employed. In conventional classical cryptography the private KD of RSA type algorithms are employed. Modern conventional classic cryptography makes use of a trap door algorithm for its public key. The assumption is on the complexity of computation, that it is difficult to factor a very large number by present computers. But any break-through in mathematics or leap in computation would invalidate such an assumption. Even private key or symmetric key distribution can be jeopardized by the eavesdropper. 106 So, any cryptography scheme based on the assumption of complexity of algorithm has a very high degree chance of letting down. Private KD runs the risk of being intercepted which cannot simply be wished away. More importantly, one is never sure if someone had eavesdropped or not, be it public or private KD scheme of the conventional classic cryptography [Reid et.al,2009]. Additionally as stated above, quantum crypto-analysis poses extremely high degree of potential threat to the present classical encryption systems. The necessity of the situation becomes acute and urgent when one considers the possibility of quantum retro-crypto analysis (or retroactive decryption) [Nicolas Gisin et al, 2009]. The evil eve might copy the existing public keys and information and create a bank of it, for potential quantum retro-analysis of the future. Hence, even the present state-of-the-art cryptology methods are neither fool proof nor future proof. For the above reasons, change over to the quantum cryptography would be compelling. Quantum cryptography is supposed to be tamper proof, fool proof and future proof. This is one of the applications where quantum weirdness has a positive, potential application. The EPR protocol and its connection to Bell-type measurement are important here. Quantum cryptography is of immense importance and value in the context of fast scientific developments, especially in the field of quantum computing as mentioned above. Ironically quantum cryptography provides a solution for the same. A future resistant way of crypto schemes is what is aimed at by Quantum cryptography. Quantum Cryptology is quite different from the classical one. It makes use of the features of quantum physics rather than depending on some kind of specific mathematical algorithm, as a key feature of its security to develop an undefeatable cryptosystem, one that is completely secure and safe against eavesdropping without the knowledge of the concerned sender or receiver of the messages. That is, quantum cryptography offers an ideally secure encryption of the data and transfer. 107 Quantum cryptology is based on fundamental quantum character of the individual elementary particle, like the photon. The following properties are basic and unique to quantum systems: a) Linearity, b) Superposition, c) Unitarity of evolution, d) No-cloning theorem [Wooters and Zurek, 1982]. Whereas it is possible to distinguish between two orthogonal quantum states any attempt to distinguish between two non-orthogonal states would irrevocably destroy the w original state. This is called the irreversibility of measurement . To see this from a closer stand point, consider the following facts. A state may be represented by a vector in a complex Hilbert space. Then measurement on a quantum system can be thought of as nothing but a projection operator acting on this vector in Hilbert space. Thus the projected state loses track of its original state giving rise to irreversibility. The memory of the past state is erased from the history of the universe itself. Thus any information on the past of the system is lost for good - a property when suitably manipulated gives rise to the phenomenon of quantum erasing. The last property mentioned above, namely the impossibility of cloning an unknown quantum state (no-cloning theorem) is mainly exploited in the quantum cryptography which in fact is only a corollary of the other three conditions. An infringement on no-cloning theorem would be a breach of linearity, causality and unitarity, or all put together. If cloning of an unknown quantum state were possible, it would amount to superluminal transmission of information. This property makes the passive listening by Eve impossible. Any elementary quantum particles can be used in cryptography but the best suited ones are of course photons, since they are reliable information carriers in the optical fiber cables. The polarizations of a set of the photons sent from Alice (sender) to Bob (receiver) form the coded information of the key. The actual encrypted message is transmitted via a public classic channel. Any attempt to measure the states of the w This fact is related with the infamous measurement problem. What is considered a bane in one context can possibly be a boon in another. Yet demonstration of these applications would confirm that the quantum weirdness can give more impetus to the study from a totally different perspective other than the usual ontological point of view. 108 photons would invariably disturb the state and hence will be noticed by the parties concerned. The sender and the receiver would compare their measurements of the polarizations of the photons to check for any potential eavesdropping. The quantum key distribution cannot prevent eavesdropping but can surely be detected with 100% efficiency. The key can then be discarded. Quantum cryptology works according to different models, a famous one being due to Bennett and Brassard [Bennett, and Brassard,1984]. Detection of intrusion by eavesdropper is vital to quantum cryptography. It is a way to combine the relative convenience and ease of key exchange in public key cryptography (PKC) with the ultimate security of a one time pad. Heisenberg’s Uncertainty Principle of QM plays a dominant role in actual practice here. Historically Quantum Cryptology was first proposed by Stephen Wiesner in early 1970’s introducing the concept of quantum conjugate coding. In 1990 Arthur Ekert developed a different approach to quantum cryptology that was based on the quantum correlation due to quantum entanglement [Ekert,1991]. Quantum cryptology has the ability to detect any interception of the key, whereas with classical ones the key security cannot be proved. Quantum Key Distribution (QKD) would mean secure communication though not guaranteed against jamming. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages. QKD systems are automatic with greater reliability factor. The Bennett and Brassard scheme of 1984 for quantum key distribution is known as BB84 scheme. It is a procedure utilizing a set of individual photons. BB84 solves the QKD problem but safe storage of the key is still a problem. Therefore Ekert proposed EPR-based protocol for key distribution [Bennett, Brassard and Ekert,1992]. The photons of EPR pair have undefined polarizations (chapter-5). These two properties together are mysterious yet it is the basis of many modern quantum applications. 109 Quantum cryptography is one of the useful modern applications of EPR and Bell states which assume now greater significance in several other technological contexts as well. What was started as pure philosophical debate between Einstein and Bohr several decades ago is likely to give efficient technological spin-offs in the modern times. Some noted physicists had considered the interpretational aspects only to be of academic interest with very little experimental content. Bell’s theorem did change the whole situation so considerably. The bottom line is not to neglect the true understanding of science [R-05]. It will definitely pay off well, even as technological spin offs, quantum cryptology being a glaring example for it, not to talk about various other applications. 7.4 Quantum Teleportation Quantum teleportation is one of the modern applications that exploit the concept of Quantum entanglement. The experimental confirmation of teleportation [Zeilinger,2005a] is the proof of the quantum nature of entanglement and hence it becomes very important from the point of understanding of QM. To see how exactly it is done, let us suppose that Alice and Bob share a pair of photons prepared in an entangled Bell state of polarization. That is, each of them possesses one of the entangled photons. Also suppose that Alice has an additional photon in an unknown state of polarization, u. Alice now performs measuremts on both the photons in her possession. There are four possible random outcomes. Bob's photon will be transformed into any one of the four states, depending on the four possible outcomes of Alice's measurement: either the state u, or a state that is related to u in a definite way. This operation of Alice entangles the two photons of her and disentangles that of Bob, forcing it into a state u*. Once Alice communicates the outcome of her operation to Bob, Bob knows either that u* = u, or how to transform u* to u by a local operation. Now the photon in Alice’s possession can be considered as teleported to Bob as the quantum state of a photon is transferred from Alice to Bob. This phenomenon clearly demonstrates the non-local quantum correlation. Here again, 110 the no-cloning prevents superluminal transmission as in quantum cryptography which is why it does not defy SRT. 7.5 Elitzur–Vaidman Bomb-Tester Avshalom Elitzur and Lev Vaidman in 1993 proposed [Elitzur and Vaidman,1993] the following ‘bomb testing problem’ which was constructed and tested with success by Anton Zeilinger, et al. in 1994 using Mach-Zehnder interferometer. This is referred to as interaction free measurement. The bomb-testing problem can be described as follows. Say, in a collection of bombs some are duds. The bombs can be detonated by a single photon. Dud bombs will not absorb the photon but good ones will absorb and explode. We can use the counterfactual phenomenon of QM to separate the usable bombs from the duds. If we try to test by detonating the usable ones, then it will destroy all the usable bombs. (The alternate version of the problem would be to detect a bomb without detonating at least some of them). A very sensitive mirror attached to the plunger activates the detonator when a photon that impinges on it is pushing the plunger. The plungers of the duds are stuck, so that they do not get pushed and therefore no detonation occurs. It means a dud one effectively reflects the photons. The fact that the photon did not actually hit the bomb's mirror is enough to know that the photon went through the other path (a "null" measurement). The experimental set-up consisting of Mach-Zehnder interferometer is arranged as shown in the figure 7.1. The light source is of very low intensity that it emits only single photon at a time. A photon reaching the beam splitter BS1 has equal chances of passing through or of getting reflected by it. Say, on path 1, a bomb is placed with the triggering mechanism by photon as described above. If the bomb is usable, then the photon is absorbed triggering the bomb. If the bomb is dud one, the photon will pass through unaffected. Let us consider the two cases separately in what follows. 111 Case 1 - The bomb is a dud one: The photon either gets reflected by the first beam splitter, BS1 and takes path-2 or after passing through BS1, is reflected by the mirror on the trigger of the bomb along path-1. The plunger will not get pushed as it is dud. The system is now like the basic Mach-Zehnder apparatus in which constructive interference occurs along the horizontal path along D1 and destructive along the vertical path towards D2. Therefore, the detector D1 will click, and the detector at D2 will not. Figure 7.1 Elitzur-Vaidman Bomb-Tester Case 2-The bomb is usable: As in the above case the two different possibilities are that the photon can take either path-1 or path-2 after encountering the beam splitter BS1. If it takes path-1 it surely gets reflected and by the plunger mirror and the bomb will definitely explode. Since the bomb acts like a detector, the wave function ‘collapses’ and therefore cannot be in superposition. If the photon takes the upper route path-2 the bomb will not explode yet there will be no interference effect. The photon now either passes through the BS2 or is reflected. The photon must be in either of the detectors D1 or D2. Hence, on the whole, there are only three outcomes: a) The bomb explodes, b) The bomb does not explode and only detector D2 detects the 112 photon. In this case we are sure that the bomb is live though it has not exploded and the photon has not interacted with it, c) The bomb does not explode and only detector D1 detects photon. It is possible that the bomb is usable or that it is a dud. In the last case, the test has to be repeated to see if the bomb will explode or if D2 will click. Usually this is sufficient to recognize all of the dud ones. The tests will identify the one third of the usable bombs without detonating but detonate two thirds of the remaining good ones. Kwiat et al in 1996 devised a technique, using a series of polarizing devices to yield a rate arbitrarily close to one. Here the answer to the query ‘what would happen’ is determined without the bomb going off. This provides an example of an experimental method to answer a counterfactual question. 7.6 Discussions While there are several potential applications that can directly exploit the quantum entanglement, quantum cryptography is the most potential one developed so far. The quantum teleportation proves that the quantum state identifies a particle (which has no other identity) as the particles cannot be associated with their history. Conveying the polarization state of photon is amounting to transmitting infinite amount of classical information as to specify an angle to arbitary acurracy. The outcome of Alice's operation can be communicated to Bob by two classical bits of information since it has only four possible outcomes with equal a priori probabilities, which is remarkable. Bob can now reconstruct the state u on the basis of just two bits of classical information. The entangled state is exploited as a quantum communication channel for the transfer of rest of the information. The no-cloning theorem is also sort of verified indirectly by these phenomena. The uniqueness of a quantum state and the almost infinite amount of classical information that it contains qualify these to be connected with the mental state. For example, when we look at an ordinary scene in life, it contains infinite classical bits of information. In a man’s life such infinite amount of information can be stored in the memory. The instant pattern 113 recognition capability of the brain is the demostration of tremendous (parrallel) computation capability. Otherwise the resources of the brain in terms of number of nerve synapses or even the number of states that the atoms in it have would be pretty very much limited. There were attempts to explain this phenomenon by holographic theory of memory by the Magellan of brain science Karl Pribram. Some people may think that the proposal to explian the brain using basic quantum phenomena, though in the right direction, is far-fetched at the moment as is reflected in the following quote, ‘The recent proposal by Penrose and Hameroff exceeds the domain of present-day quantum theory by far and is the most speculative example’ [Atmanspacher, Harald,2008]. But we do feel that the powerful quantum phenomena and the emerging revolutionanary ideas can really revolutionise this new field in due course of time. Elitzur-Vaidman bomb tester is another example that demonstrates a further strange aspect of QM. The laboratory version of it has already been successfully demonstrated. The interaction free measurement (IFM) emphasizes the counterfactual phenomena are important in QM. That is, in a quantum interaction the possible events and situations that could have happened but not really taken place are important. This is an important non-classical property that has direct bearing on the quantum reality. The ‘omniscience’ of the elementary particles has now tangible effects and potential applications. A variation of this quantum property is made use of in quantum computing where parallelism is achieved by the counterfactual way in what is called computation without computation. When a photon interacts with the beam splitter its state is non-deterministically altered only to go into quantum superposition state until an observer interacts with it causing the state vector reduction forcing the photon to a deterministic state. We relate this phenomenon of counterfactual phenomenon and IFM with the Feynman’s formalism mentioned in chapter-2. Equations (2.30) and (2.33) depict this feature (see also fig 2.1). The many histories take into account not the classical paths but the non-classical ones as well. The quantum particles can ‘sniff’ the surroundings paths. The above facts demonstrate three facets of QM: 114 1) Non-locality, 2) Counter factuality and 3) Strange quantum reality. This formulation even considers amplitudes for speeds greater than the velocity of light as well as that for particle traversing backward in time as well. The triumphs of QED and Feynman graphs justify these counter intuitive, non-classical histories. 115